Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 13666

Full-Text Articles in Computer Engineering

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal Oct 2020

Camera Placement Meeting Restrictions Of Computer Vision, Sara Aghajanzadeh, Roopasree Naidu, Shuo-Han Chen, Caleb Tung, Abhinav Goel, Yung-Hsiang Lu, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

In the blooming era of smart edge devices, surveillance cam- eras have been deployed in many locations. Surveillance cam- eras are most useful when they are spaced out to maximize coverage of an area. However, deciding where to place cam- eras is an NP-hard problem and researchers have proposed heuristic solutions. Existing work does not consider a signifi- cant restriction of computer vision: in order to track a moving object, the object must occupy enough pixels. The number of pixels depends on many factors (how far away is the object? What is the camera resolution? What is the focal length ...


Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris Aug 2020

Investigating Single Precision Floating General Matrix Multiply In Heterogeneous, Steven Harris

Engineering and Applied Science Theses & Dissertations

The fundamental operation of matrix multiplication is ubiquitous across a myriad of disciplines. Yet, the identification of new optimizations for matrix multiplication remains relevant for emerging hardware architectures and heterogeneous systems. Frameworks such as OpenCL enable computation orchestration on existing systems, and its availability using the Intel High Level Synthesis compiler allows users to architect new designs for reconfigurable hardware using C/C++. Using the HARPv2 as a vehicle for exploration, we investigate the utility of several of the most notable matrix multiplication optimizations to better understand the performance portability of OpenCL and the implications for such optimizations on this ...


A Real-Time Feature Indexing System On Live Video Streams, Aditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu Jul 2020

A Real-Time Feature Indexing System On Live Video Streams, Aditya Chakraborty, Akshay Pawar, Hojoung Jang, Shunqiao Huang, Sripath Mishra, Shuo-Han Chen, Yuan-Hao Chang, George K. Thiruvathukal, Yung-Hsiang Lu

Computer Science: Faculty Publications and Other Works

Most of the existing video storage systems rely on offline processing to support the feature-based indexing on video streams. The feature-based indexing technique provides an effec- tive way for users to search video content through visual features, such as object categories (e.g., cars and persons). However, due to the reliance on offline processing, video streams along with their captured features cannot be searchable immediately after video streams are recorded. According to our investigation, buffering and storing live video steams are more time-consuming than the YOLO v3 object detector. Such observation motivates us to propose a real-time feature indexing (RTFI ...


Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar Jul 2020

Occ Future And Obstacles Under 5g Requirements, Noor Jihad, Sinan Abdul Satar

Emirates Journal for Engineering Research

Telecommunications specifications of the fifth-generation (5 G) are being established to satisfy the rising demands of high-speed broadband networks (i.e., a few tens of Gigabits every second). The 5 G standard derives primarily from a rising number of subscribers and a multitude of various apps, commonly referred to as smart devices, communicating as part of Internet-of-Things (IoT) network For 5 G, a few possible developments such as millimeter waves, large multiple-input multiple-output, and small cell connectivity have appeared. While such technologies will meet 5 G specifications, attention is being given to a complementary potential wireless optical wireless communication (OWC ...


Analysis Of Information Security Methods In Biosystems And Application Of Intelligent Tools In Information Security Systems, Sherzod Sayfullaev Jul 2020

Analysis Of Information Security Methods In Biosystems And Application Of Intelligent Tools In Information Security Systems, Sherzod Sayfullaev

Chemical Technology, Control and Management

In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed. Disadvantages and advantages of neural network technologies in modern information security systems are described. The characteristics of bio systems and the specificity of DNA, the main features of the DNA code that provide information security and functional stability of bio systems data protection structure. Application of intelligent tools to create a comprehensive adaptive protection ...


Non Infinite Stories: How Digital Allow To Create Infinite Reconformations Of A Text?, David Núñez Jul 2020

Non Infinite Stories: How Digital Allow To Create Infinite Reconformations Of A Text?, David Núñez

Electronic Literature Organization Conference 2020

Last year I presented at ELO, in Ireland, the Artistic piece "Bastard" a digital fiction that combine a fragmented novel to create 10x149 differents texts and optimized in 4 billions coherent stories with narrative structures. In Orlando we want to explain how the system works, theory and functioning, and invited all the members to produce they personal "infinite" fiction.

Non Infinite Stories is an electronic publishing house that creates a dynamic hyperliterature system to give each reader a unique book by using a digital combinatorial processes, specific narrative rules and optimization of fragmented works in chapters of short narrative blocks ...


User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane Jul 2020

User Interface Design For Mobile Financial Services: Users Perspective, Belachew U. Regane

African Conference on Information Systems and Technology

Users belonging to different countries have different exposure and perception to trust the technology to adopt it. Users’ trust and adoption rates are challenging issues in mobile financial services. Thus, the purpose of the research is how to design a trustful user interface. Market research is conducted to collect data. Using the data, personas and use cases developed. The result of personas and use cases used to develop prototypes. Prototype A and B designed differently to give choice to users to investigate users' trust. Prototype A is designed to make it easy to use and clear workflow. Whereas prototype B ...


Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke Jul 2020

Usability And Accessibility Model For E-Government Websites In Ethiopia, Yoseph Zeleke

African Conference on Information Systems and Technology

The development of websites and portals are main components of the e-Government strategy implementations for the last nine years in Ethiopia. However, services optimizations with usability and accessibility are key issues of Ethiopia e-Government services development.

Therefore, the ultimate goal of this study is creation of usable, accessible and sustainable Ethiopian eGovernment websites with four stage of research analysis, through proposed model. The investigations results are used to provide a clear picture of what needs to be improves from management and user point of views and also from other stakeholders of e-Government services. This study applies mixed methods of data ...


A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata Jul 2020

A Comprehensive Study For Modern Models: Linking Requirements With Software Architectures, Sisay Yemata

African Conference on Information Systems and Technology

Several models recently have been addressed in software engineering for requirements transformation. However, such transformation models have encountered many problems due to the nature of requirements. In the classical transformation modeling, some requirements are discovered to be missing or erroneous at later stages, in addition to major assumptions that may affect the quality of the software. This has created a crucial need for new approaches to requirements transformation. In this paper, a comprehensive study is presented in the main modern models of linking requirements to software architectures. An extensive evaluation is conducted to investigate the capabilities of such modern models ...


Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw Jul 2020

Artificial Intelligence Towards Future Industrial Opportunities And Challenges, Gizealew Dagnaw

African Conference on Information Systems and Technology

The industry 4.0 will bring reflective changes to our society, including an important digital shift in the manufacturing sector. At present, several manufacturing firms are trying to adopt the practices of industry 4.0 throughout their supply chain. The Fourth Industrial Revolution and the artificial intelligence at its core are fundamentally changing the way we live, work and interact as citizens. The complexity of this transformation may look overwhelming and to many threatening. Recently, the dramatic growth of new generation information technologies has prompted several countries to seek new strategies for industrial revolution. The globalization and the competitiveness are ...


Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle Jul 2020

Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle

African Conference on Information Systems and Technology

Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For ...


Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola Jul 2020

Power-Over-Tether Uas Leveraged For Nearly-Indefinite Meteorological Data Acquisition, Daniel Rico, Carrick Detweiler, Francisco Muñoz-Arriola

Computer Science and Engineering: Theses, Dissertations, and Student Research

Use of unmanned aerial systems (UASs) in agriculture has risen in the past decade. These systems are key to modernizing agriculture. UASs collect and elucidate data previously difficult to obtain and used to help increase agricultural efficiency and production. Typical commercial off-the-shelf (COTS) UASs are limited by small payloads and short flight times. Such limits inhibit their ability to provide abundant data at multiple spatiotemporal scales. In this paper, we describe the design and construction of the tethered aircraft unmanned system (TAUS), which is a novel power-over-tether UAS leveraging the physical presence of the tether to launch multiple sensors along ...


Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz Jun 2020

Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz

Conference papers

Abstract—In this paper, we are investigating the presence of concept drift in machine learning models for detection of hacker communications posted in social media and hacker forums. The supervised models in this experiment are analysed in terms of performance over time by different sources of data (Surface web and Deep web). Additionally, to simulate real-world situations, these models are evaluated using time-stamped messages from our datasets, posted over time on social media platforms. We have found that models applied to hacker forums (deep web) presents an accuracy deterioration in less than a 1-year period, whereas models applied to Twitter ...


Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed Jun 2020

Similarity Evaluation Based On Contextual Modelling, Mohamed H. Haggag, Marwa M. A. Elfattah, Ahmed Mohammed Ahmed

Future Computing and Informatics Journal

Measuring Text similarity problem still one of opened fields for research area in natural language processing and text related research such as text mining, Web page retrieval, information retrieval and textual entailment. Several measures have been developed for measuring similarity between two texts: such as Wu and Palmer, Leacock and Chodorow measure and others . But these measures do not take into consideration the contextual information of the text .This paper introduces new model for measuring semantic similarity between two text segments. This model is based on building new contextual structure for extracting semantic similarity. This approach can contribute in solving ...


Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif Jun 2020

Adaptive Concept Map Approach For Software Requirements Validation, Ayman Khedr, Ahmed A. Ahmed, Sherif Kholeif

Future Computing and Informatics Journal

Requirements validation is one of the most significant and critical parts of the requirements engineering. This activity ensures that the set of requirements is accurate, right, complete, and consistent. Requirements validation is considered as the key activity because mistakes found in a software requirements document can lead to extensive rework costs when they are discovered either during development or after the system is in service. There are some commonly used bases to validate user requirements such as: Natural language, Design description languages, Graphical notations and Mathematical specification languages. Whereas the graphical notations are the most suitable means to be used ...


Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry Jun 2020

Generic Approach For Customer Management System, Esraa A. Afify, Mona A. Kadry

Future Computing and Informatics Journal

Customer Complaints are considered as valuable and significant information that can be utilized to attain customer satisfaction. Accordingly, a complaint handling system can address customer dissatisfaction and prevent similar problems from reoccurring. The aim of this paper is to investigate the level of relationship between the complaints and complaint behaviours of the customers who benefit from the services offered. In this paper, a generic approach for the Customer Complaint Management System is pro posed to have the ability to minimize customers’ dissatisfaction and on the other hand to motivate customers to take part of controlling the quality of the services ...


A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy Jun 2020

A General Approach Students’ Attitude Towards To Virtual Reality Technology In Distance Education Environment, Osama Emam, Mohamed Abdelsalam, Ayman E. Khedr, Yehia Helmy

Future Computing and Informatics Journal

E-learning has become a prominent and effective role in recent years. The factor of place and time became ineffective in the educational process. So that anyone can learn anywhere in the world. The educational services that benefit the learner during the educational process as well as the factors of assistance are important elements that help in the success of the educational process in the environment of e-learning. The more these services, the greater the benefit from e-learning. But its way of reviewing electronic content is still ineffective. Therefore it was necessary to create a suitable environment for the learner is ...


Improved Rsa Security Using Chinese Remainder Theorem And Multiple Keys, Hatem Abdulkader, Rasha Samir, Reda Hussien Jun 2020

Improved Rsa Security Using Chinese Remainder Theorem And Multiple Keys, Hatem Abdulkader, Rasha Samir, Reda Hussien

Future Computing and Informatics Journal

Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non readable, to secure data information transmits over the network, In this paper introduced modified RSA approach based on multi keys and Chinese remainder theorem (CRT), which RSA algorithm is asymmetric key encryption technique. The objective of this Technique is to provide secure transmission of data between any networks. Which is the Network security is an activity which is designed to provide ...


Distributed Firewall For Iot, Ryan Lund, Anthony Fenzl, Chelsea Villanueva Jun 2020

Distributed Firewall For Iot, Ryan Lund, Anthony Fenzl, Chelsea Villanueva

Computer Science and Engineering Senior Theses

Minimal local resources, lack of consistency in low level protocols and market pressures contribute to IoT devices being more vulnerable than traditional computing devices. These devices not only have a wide variety of processors and implementations, but they often serve different purposes and generate unique network traffic. Current IoT network security solutions fail to account for and handle both the scale at which IoT devices can be deployed and the heterogeneous nature of the traffic they produce. In order to accommodate these differences and improve on current solutions, we propose the implementation of a microsegmented firewall for IoT networks. Unlike ...


Sustainability Action Tracker, Gladys Hilerio, Isabelle Termaat, Patricia Ornelas Jauregui Jun 2020

Sustainability Action Tracker, Gladys Hilerio, Isabelle Termaat, Patricia Ornelas Jauregui

Computer Science and Engineering Senior Theses

The Center for Sustainability at Santa Clara University is actively looking for ways to involve students in sustainable actions and accountability. With our help, they would like to create a site where students and faculty may track their sustainable behavior. This site will provide users with all the information they need to live a sustainable life, and include milestones in the form of progress bars and badges. The Center for Sustainability will be able to collect the data from this site to evaluate the progress of our university as well as the success of the site. Our motivation for this ...


Antlion Optimization And Boosting Classifier For Spam Email Detection, Amany A. Naem, Neveen I. Ghali Prof., Afaf A. Saleh Jun 2020

Antlion Optimization And Boosting Classifier For Spam Email Detection, Amany A. Naem, Neveen I. Ghali Prof., Afaf A. Saleh

Future Computing and Informatics Journal

Spam emails are not necessary, though they are harmful as they include viruses and spyware, so there is an emerging need for detecting spam emails. Several methods for detecting spam emails were suggested based on the methods of machine learning, which were submitted to reduce non relevant emails and get results of high precision for spam email classification. In this work, a new predictive method is submitted based on antlion optimization (ALO) and boosting termed as ALO-Boosting for solving spam emails problem. ALO is a computational model imitates the preying technicality of antlions to ants in the life cycle. Where ...


A New Online Scheduling Approach For Enhancing Qos In Cloud, Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed Jun 2020

A New Online Scheduling Approach For Enhancing Qos In Cloud, Aida A. Nasr, Nirmeen A. El-Bahnasawy, Gamal Attiya, Ayman El-Sayed

Future Computing and Informatics Journal

Quality-of-Services (QoS) is one of the most important requirements of cloud users. So, cloud providers continuously try to enhance cloud management tools to guarantee the required QoS and provide users the services with high quality. One of the most important management tools which play a vital role in enhancing QoS is scheduling. Scheduling is the process of assigning users’ tasks into available Virtual Machines (VMs). This paper presents a new task scheduling approach, called Online Potential Finish Time (OPFT), to enhance the cloud data-center broker, which is responsible for the scheduling process, and solve the QoS issue. The main idea ...


Automatic Labeling Of Hidden Web Data Using Multi-Heuristics Annotator, Umamageswari Baskaran, R. Kalpana Jun 2020

Automatic Labeling Of Hidden Web Data Using Multi-Heuristics Annotator, Umamageswari Baskaran, R. Kalpana

Future Computing and Informatics Journal

Hidden web contains huge amount of high quality data which are not indexed to search engines. Hidden web refers to web pages which are generated dynamically by embedding backend data matching the search keywords, in server-side templates. They are created for human consumption and makes automated processing cumbersome since structured data is embedded within unstructured HTML tags. In order to enable machine processing, structured data must be detected, extracted and annotated. Many heuristic based approaches DeLa [1], MSAA [2] are available in the literature to perform automatic annotation. Most of these techniques fail if data values didn't contain labels ...


A Systematic Review For The Determination And Classification Of The Crm Critical Success Factors Supporting With Their Metrics, Mahmoud Abd Ellatif, Marwa Salah Farhan, Amira Hassan Abed Jun 2020

A Systematic Review For The Determination And Classification Of The Crm Critical Success Factors Supporting With Their Metrics, Mahmoud Abd Ellatif, Marwa Salah Farhan, Amira Hassan Abed

Future Computing and Informatics Journal

The successful implementation of customer relationship management (CRM) is not easy and seems to be a complex task. Almost about 70% of all CRM implementation projects fail to achieve their expected objectives. Therefore, most researchers and information systems developers concentrate on the critical success factors approach which can enhance the success of CRM implementation and turn the failure and drawbacks faced CRM into successful CRM systems adoption and implementation. In this paper, the number of the previous studies is reviewed to demonstrate the barriers behind this high failure rate. In addition, an extensive review is conducted in order to identify ...


Stage – Specific Predictive Models For Main Prognosis Measures Of Breast Cancer, Ahmed Attia Said, Laila A. Abd-Elmegid, Sherif Kholeif, Ayman Abdelsamie Gaber Jun 2020

Stage – Specific Predictive Models For Main Prognosis Measures Of Breast Cancer, Ahmed Attia Said, Laila A. Abd-Elmegid, Sherif Kholeif, Ayman Abdelsamie Gaber

Future Computing and Informatics Journal

Breast cancer is a malignant tumor that starts in the cells of the breast. A malignant tumor is a group of cancer cells that can grow into near tissues or invading the distant areas of the body. The disease occurs almost entirely in women, but men can get it, too. Survival rate, recurrence detection and disease-free survival rate (DFS) are the main patient's outcome and prognosis measures. Breast cancer outcomes are vary among different stages of the disease. There are five stages of breast cancer named as 0, 1, 2, 3, and 4. Prognosis helps doctors to save patients ...


Applying Spatial Intelligence For Decision Support Systems, Amira Idrees, Mohamed H. Ibrahim Jun 2020

Applying Spatial Intelligence For Decision Support Systems, Amira Idrees, Mohamed H. Ibrahim

Future Computing and Informatics Journal

Data mining is one of the vital techniques that could be applied in different fields such as medical, educational and industrial fields. Extracting patterns from spatial data is very useful to be used for discovering the trends in the data. However, analyzing spatial data is exhaustive due to its details as it is related to locations with a special representation such as longitude and latitude. This paper aims at proposing an approach for applying data mining techniques over spatial data to find trends in the data for decision support. Basic information considering spatial data is presented with presenting the proposed ...


An Qos Based Multifaceted Matchmaking Framework For Web Services Discovery, G. Sambasivam Jun 2020

An Qos Based Multifaceted Matchmaking Framework For Web Services Discovery, G. Sambasivam

Future Computing and Informatics Journal

With the increasing demand, the web service has been the prominent technology for providing good solutions to the interoperability of different kind of systems. Web service supports mainly interoperability properties as it is the major usage of this promising technology. Although several technologies had been evolved before web service technology and this has more advantage of other technologies. This paper has concentrated mainly on the Multifaceted Matchmaking framework for Web Services Discovery using Quality of Services parameters. Traditionally web services have been discovered only with the functional properties like input, output, precondition and effect. Nowadays there is an increase in ...


Medical Image Retrieval Using Self-Organising Map On Texture Features, Shashwati Mishra Jun 2020

Medical Image Retrieval Using Self-Organising Map On Texture Features, Shashwati Mishra

Future Computing and Informatics Journal

The process of capturing, transfer and sharing of information in the form of digital images have become easier due to the use of advanced technologies. Retrieval of desired images from these huge collections of image databases is one of the popular research areas and has its applications in various fields. An image set consists of images containing objects of different colours, shapes, orientations and sizes. The surface texture of the object in an image may also vary from another object in a different image. These factors make the process of image retrieval a difficult one. In this paper, Self-Organising Map ...


Benign And Malignant Breast Cancer Segmentation Using Optimized Region Growing Technique, S. Punitha, A. Amuthan, K. Suresh Joseph Jun 2020

Benign And Malignant Breast Cancer Segmentation Using Optimized Region Growing Technique, S. Punitha, A. Amuthan, K. Suresh Joseph

Future Computing and Informatics Journal

Breast cancer is one of the dreadful diseases that affect women globally. The occurrences of breast masses in the breast region are the main cause for women to develop a breast cancer. Early detection of breast mass will increase the survival rate of women and hence developing an automated system for detection of the breast masses will support radiologists for accurate diagnosis. In the pre-processing step, the images are pre-processed using Gaussian filtering. An automated detection method of breast masses is proposed using an optimized region growing technique where the initial seed points and thresholds are optimally generated using a ...